3. INTRODUCTION
The body’s autonomic nervous system,
which controls involuntary actions without
conscious awareness or involvement, has
fascinated the world of medicine. So why
can’t it be the same with computers?
……………
Must a computer engineer or a systems
administrator monitor a server round-
the-clock to ensure normal operation?
……………
6. BENEFITS
Immediate benefits will include
reduced dependence on human
intervention to maintain complex
systems accompanied by a
substantial decrease in costs.
Long-term benefits will allow
individuals, organizations and
businesses to collaborate on
complex problem solving.
7. CHALLENGES
Scalable storage and processing
power
Transparency in routing and
formatting data to variable devices
Evolving chip development to better
leverage memory
Improving network-monitoring
functions
Smarter microprocessors that can
detect errors and anticipate
failures
8. PROBLEM
New demands due to simultaneous
explosion of information and
integration of technology into
everyday life
The stability of current
infrastructure, systems, and data
is at an increasingly greater risk to
suffer outrages and general
disrepair.
Increasing system complexity is
reaching a level beyond human
ability to manage and secure.
9. SOLUTION
The solution may lie in automation,
or creating a new capacity where
important computing operations can
run without the need for human
intervention. This new model of
computing is called autonomic
computing. The good news is that
some components of this technology
are already up and running.
10. ELIZA
ELIZA is a program which permits
natural-language conversation
between a human and a computer
It is an ongoing effort to create
servers that respond to unexpected
capacity demands and system
glitches without human intervention.
Its goals are to achieve new
heights in reliability, availability
and serviceability, and new lows in
downtime and cost of ownership.
11. Traits Of Project Eliza
Support for dynamic clustering
Support for dynamic partitioning
EZSetUp wizards, allowing for self-
installation
User authentication, directory
integration and other tools to protect
access to network resources
Heterogeneous enterprise-wide
workload management
12. Other Examples
Adaptive data flow engine
North Carolina biometrics grid
Machine check architecture (MCA)
IceCube server
Recovery-oriented computing (ROC)